Date


People

Output Type

Download Available

Library Of Congress

Dewey Decimal

1422 results

Converting an existing taxonomic data resource to employ an ontology and LSIDs.

Conference Proceeding
Kennedy, J., Gales, R., & Kukla, R. (2006)
Converting an existing taxonomic data resource to employ an ontology and LSIDs. In L. Belbin, A. Rissoné, & A. Weitzman (Eds.), Proceedings of TDWG (2006), St Louis, MI
Data sharing is fundamental to biodiversity and taxonomic data applications, however previous attempts at developing mechanisms to facilitate sharing within the community have...

A Quantitative Field Study of a Persuasive Security Technology in the Wild

Conference Proceeding
Vargheese, J. P., Collinson, M., & Masthoff, J. (2022)
A Quantitative Field Study of a Persuasive Security Technology in the Wild. In Social Informatics: 13th International Conference, SocInfo 2022, Glasgow, UK, October 19–21, 2022, Proceedings (211-232). https://doi.org/10.1007/978-3-031-19097-1_13
Persuasive techniques and persuasive technologies have been suggested as a means to improve user cybersecurity behaviour, but there have been few quantitative studies in this ...

Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features

Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2020)
Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features. In 2020 International Joint Conference on Neural Networks (IJCNN). https://doi.org/10.1109/IJCNN48605.2020.9207462
Industrial Control Systems have become a priority domain for cybersecurity practitioners due to the number of cyber-attacks against those systems has increased over the past f...

A refinement calculus for the development of real-time systems.

Conference Proceeding
Chen, Z., Cau, A., Zedan, H., Liu, X., & Yang, H. (1998)
A refinement calculus for the development of real-time systems. In 5th Asia Pacific Software Engineering Conference, APSEC '98, 61. https://doi.org/10.1109/APSEC.1998.733588
We present a calculus which can transfer specifications to objects for the development of real-time systems. The object model is based on a practical OO development technique—...

The Design and Evaluation of a Modern C++ Library

Conference Proceeding
Chalmers, K. (2016)
The Design and Evaluation of a Modern C++ Library. In Communicating Process Architectures 2016
Although many CSP inspired libraries exist, none yet have targeted modern C++ (C++11 onwards). The work presented has a main objective of providing a new C++ CSP library which...

IRIDiuM+: deep media storytelling with non-linear light field video

Conference Proceeding
Kosek, M., Koniaris, B., Sinclair, D., Markova, D., Rothnie, F., Smoot, L., & Mitchell, K. (2017)
IRIDiuM+: deep media storytelling with non-linear light field video. In SIGGRAPH '17 ACM SIGGRAPH 2017 VR Village. https://doi.org/10.1145/3089269.3089277
We present immersive storytelling in VR enhanced with non-linear sequenced sound, touch and light. Our Deep Media (Rose 2012) aim is to allow for guests to physically enter re...

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier

Conference Proceeding
Hall, A. J., Pitropakis, N., Buchanan, W. J., & Moradpoor, N. (2019)
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. In 2018 IEEE International Conference on Big Data (Big Data)https://doi.org/10.1109/BigData.2018.8621922
Insider threats continue to present a major challenge for the information security community. Despite constant research taking place in this area; a substantial gap still exis...

Building timber gridshells with air: Numerical simulations and technique challenges

Conference Proceeding
Liuti, A., D'Amico, B., & Pugnale, A. (2016)
Building timber gridshells with air: Numerical simulations and technique challenges. In P. J. S. Cruz (Ed.), Structures and Architecture: Beyond their Limits
Construction has always been a fascinating and challenging aspect of timber gridshells. So far, only three techniques have successfully been used for the erection of such stru...

Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach

Conference Proceeding
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015)
Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach. In M. Ganzha, L. Maciaszek, & M. Paprzycki (Eds.), Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, (1267-1272). https://doi.org/10.15439/2015F118
In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the de...

Home automation: HMM based fuzzy rule engine for Ambient intelligent smart space

Conference Proceeding
Singh Jamnal, G., Liu, X., & Fan, L. (2017)
Home automation: HMM based fuzzy rule engine for Ambient intelligent smart space. In Proceedings of The 29th International Conference on Software Engineering and Knowledge Engineering
In this paper, we proposed a new type of decision making system to achieve the intelligent goal for automated smart environments. The artificial intelligence techniques, used ...